ascon / ascon-hardwareLinks
NIST LWC Hardware Reference Implementation of Ascon v1.2
☆26Updated last year
Alternatives and similar repositories for ascon-hardware
Users that are interested in ascon-hardware are comparing it to the libraries listed below
Sorting:
- Side-Channel Analysis Library☆96Updated 3 weeks ago
- Hardware Design of Ascon☆23Updated 2 weeks ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆37Updated 3 years ago
- ☆59Updated 4 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆60Updated 2 years ago
- David Canright's tiny AES S-boxes☆28Updated 10 years ago
- Hardware implementation of Saber☆9Updated 5 years ago
- Cryptanalysis of Physically Unclonable Functions☆88Updated last year
- ☆21Updated last year
- Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms☆38Updated 4 years ago
- ☆12Updated last year
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆33Updated this week
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software☆40Updated last week
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆12Updated last month
- Side-channel analysis setup for OpenTitan☆35Updated 2 weeks ago
- Hardware implementations of the authenticated encryption design ASCON☆19Updated 7 years ago
- Masked Hardware AES with HPC☆13Updated 9 months ago
- Intel Homomorphic Encryption Acceleration Library for FPGAs, including open source implementation of FPGA kernels for accelerating NTT, I…☆104Updated 2 years ago
- ☆9Updated 5 years ago
- Masked Ascon Software Implementations☆11Updated 3 years ago
- This repository is for our paper "High-Performance and Configurable SW/HW Co-design of Post-Quantum Signature CRYSTALS-Dilithium" in ACM …☆10Updated last year
- Module-Lattice-based Digital Signature Standard Standard by NIST i.e. FIPS 204☆51Updated last month
- ☆51Updated last year
- ☆56Updated last year
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆11Updated 3 years ago
- Post-quantum crypto library for the ARM Cortex-M4☆359Updated 3 weeks ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆22Updated 10 months ago
- SILVER - Statistical Independence and Leakage Verification☆14Updated 2 months ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 6 years ago